Computer Science ›› 2013, Vol. 40 ›› Issue (6): 103-107.
Previous Articles Next Articles
WANG Jian,ZHANG Zhi-yong,YU Wei-hua and YANG Li-jun
[1] Rosenblatt W,Trippe W,Mooney S.Digital Rights Management:Business and Technology[M].New York:M&T Books,2002 [2] 俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1966 [3] 张志勇,牛丹梅.数字版权管理中数字权利使用控制研究进展[J].计算机科学,2011,38(4):48-54 [4] Stamm S,Sheppsrd N P.Implementing trusted terminals with a TPM and SIDDRM[C]∥Proceedings of REM 2007.2007:73-85 [5] Sadighi A R,Wolf M.Christisn stuble enabling fairer rights management with trusted computing[C]∥Proceedings of ISC 2007.2007:53-70 [6] 邱罡,王玉磊,周利华.基于可信计算的DRM互操作研究[J].计算机科学,2009,6(1):77-80 [7] Gallery E.Authorisation Issues for Mobile Code in Mobile Systems[D].London:Royal Holloway,University of London,2007 [8] Grawrock D.TCG Specification Architecture Overview Revision 1.4[EB/OL].https://www.trusted computinggroup.org/groups/TCG_1.4_Archiecture_Overview.pdf,2011-05-01 [9] Sailer R,Jaeger T,Zhang Xiao-lan,et al.Attestation-based Policy Enforcement for Remote Access[C]∥Proceedings of the 11th ACM conference on Computer and communications security,CCS’04.2004:308-317 [10] TCG Infrastructure Workgroup.Subject Key Attestation Evi-dence Extension Specification Version1.0[EB/OL].http://www.trustedcomputinggroup.org/specs/IWG/IWG_SKAE_Extension_1-00.pdf,2005-06-16 [11] Housley R,Polk W,Ford W,et al.Internet X.509Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (RFC 3280)[Z].Internet Engineering Task Force,Network Working Group,2002 |
No related articles found! |
|